Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended |
---|---|
Dec. 31, 2024 | |
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
As one of the critical elements of the Company’s strategy, the Company’s cybersecurity program is focused on the following key areas:
•Governance: As discussed in more detail under the heading “Governance,” the Board’s oversight of cybersecurity risk management is supported by the Audit Committee of the Board, which regularly interacts with members of senior management tasked with various risk management functions.
•Collaborative Approach: The Company has implemented a comprehensive, cross-functional approach to identifying, preventing, and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management promptly.
•Technical Safeguards: The Company deploys technical safeguards that are designed to protect the Company’s information systems from cybersecurity threats, including firewalls, intrusion prevention and detection systems, anti-malware functionality, and access controls, which are evaluated and improved through vulnerability assessments and cybersecurity threat intelligence.
•Incident Response and Recovery Planning: The Company has established and maintains comprehensive incident response and recovery plans that fully address the Company’s response to a cybersecurity incident, and such plans are tested and evaluated regularly.
•Education and Awareness: The Company provides regular, mandatory training for personnel regarding cybersecurity threats as a means to equip the Company’s personnel with effective tools to address cybersecurity threats, and to communicate the Company’s evolving information security policies, standards, processes, and practices.
The Company engages in the periodic assessment and testing of the Company’s policies, standards, processes, and practices that are designed to address cybersecurity threats and incidents. These efforts include a wide range of activities, including assessments, tabletop exercises, vulnerability testing, and other exercises focused on evaluating the effectiveness of our cybersecurity measures and planning. The Company also engages third parties to perform assessments on our cybersecurity measures.
|
Cybersecurity Risk Management Processes Integrated [Flag] | true |
Cybersecurity Risk Management Processes Integrated [Text Block] | The Company has implemented a comprehensive, cross-functional approach to identifying, preventing, and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that provide for the prompt escalation of certain cybersecurity incidents so that decisions regarding the public disclosure and reporting of such incidents can be made by management promptly. |
Cybersecurity Risk Management Third Party Engaged [Flag] | true |
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true |
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false |
Cybersecurity Risk Board of Directors Oversight [Text Block] | The Board, in coordination with the Audit Committee, oversees the Company’s management of risks arising from cybersecurity threats. The Board and the Audit Committee each receive quarterly presentations and reports on cybersecurity risks, which address a wide range of topics including recent developments, evolving standards, vulnerability assessments, third-party and independent reviews, the threat environment, technological trends, and information security considerations arising with respect to the Company’s peers and third parties. The Board and the Audit Committee also receive prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding any such incident until it has been addressed. |
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board, in coordination with the Audit Committee, oversees the Company’s management of risks arising from cybersecurity threats. |
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board and the Audit Committee also receive prompt and timely information regarding any cybersecurity incident that meets established reporting thresholds, as well as ongoing updates regarding any such incident until it has been addressed. |
Cybersecurity Risk Role of Management [Text Block] | The Company relies on its Executive management and internal technical experts to implement a program designed to protect the Company’s information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with the Company’s incident response and recovery plans. To facilitate the success of the Company’s cybersecurity risk management program, dedicated personnel are deployed with the expertise to address cybersecurity threats and to respond to cybersecurity incidents if and as they occur. The expertise of such dedicated personnel is primarily derived from prior employment and training in the information technology and/or cybersecurity space. Members of the Security leadership team have served in various leadership roles across the security, intelligence, and cybersecurity domains for over 20 years. Their previous experience spans across the military and private sector, previously leading global cybersecurity intelligence & defensive operations at a fortune 500 enterprise. They hold various security credentials, certifications, and memberships in cybersecurity leadership organizations. Their professional education includes business management, computer science, and computer applications expertise. Through ongoing communications with these teams, members of management monitor the prevention, detection, mitigation, and remediation of cybersecurity threats and incidents in real-time, and report such threats and incidents to the Audit Committee when appropriate. |
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true |
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] | The Company relies on its Executive management and internal technical experts to implement a program designed to protect the Company’s information systems from cybersecurity threats and to promptly respond to any cybersecurity incidents in accordance with the Company’s incident response and recovery plans. |
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] | The expertise of such dedicated personnel is primarily derived from prior employment and training in the information technology and/or cybersecurity space. Members of the Security leadership team have served in various leadership roles across the security, intelligence, and cybersecurity domains for over 20 years. Their previous experience spans across the military and private sector, previously leading global cybersecurity intelligence & defensive operations at a fortune 500 enterprise. They hold various security credentials, certifications, and memberships in cybersecurity leadership organizations. Their professional education includes business management, computer science, and computer applications expertise. |
Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Through ongoing communications with these teams, members of management monitor the prevention, detection, mitigation, and remediation of cybersecurity threats and incidents in real-time, and report such threats and incidents to the Audit Committee when appropriate. |
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |